Data Retention
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements.Read more…
A free enterprise grade secure communications app for voice, video and messaging.
Quickly and easily create a secure bubble that you control around your entire communications infrastructure.
Extend your security bubble to third party apps and services.
Build a proven security stack into new and existing apps with minimal coding and development.
A free enterprise grade secure communications app for voice, video and messaging.
Quickly and easily create a secure bubble that you control around your entire communications infrastructure.
Extend your security bubble to third party apps and services.
Build a proven security stack into new and existing apps with minimal coding and development.
Secure chat for personal and group messages with any of your contacts on Ceerus
End-to-end encrypted high quality voice and video calls with any Ceerus user over any network condition
Dynamically connect to different servers to change data storage and access policies
Add premium functionality to connect with contacts on apps like WhatsApp and Wickr or call users that don’t have the Ceerus app
Ceerus App was built from the ground up for the enterprise environment. With the increase in remote working, staff and customers are exposed to a wide range of cyber risks.
Ceerus App authenticates every user to ensure that the person on both sides of the call are who they say they are. This starts from the second the user is onboarded to every single call that takes place, which is encrypted using ID-based encryption to ensure every conversation is authenticated on both sides.
Ceerus App encrypts all data - whether it’s voice, video or chat – using the same end-to-end encryption to prevent eavesdropping.
Weaknesses in the telecoms network can be exploited by hackers to expose your communications. Ceerus encrypts all data “Over The Top (OTT)” to provide an additional level of security on top of your telecoms networks to prevent these types of attacks.
We will never share your data with advertisers or monetise your data in any way so you can be sure that your data always stays private.
With Ceerus Enterprise, you control exactly where the data from the Ceerus App is stored, who hosts the servers and who has access to it. We provide complete control of the entire infrastructure to our customers.
Ceerus App was built with security at the core of every design decision. Read more about the protocols and techniques we use to make sure your data is always kept secure.
We are constantly adding additional capabilities to the platform to ensure security is never compromised.
Here are some of the frequently asked questions about Ceerus App and why you should use it.
Ceerus App is a free for life enterprise grade secure messaging app built on the Ceerus platform. It currently supports secure voice, video and messaging using the Mikey-Sakke standard promoted by the National Cyber Security Centre
All communications are encrypted at the device to enable end-to-end security. The encryption is carried out using industry standard AES-128, which is recommended for OFFICIAL level communications.
Unlike many of the commercial apps that have security built in as an afterthought, Ceerus was developed from the ground up with security at every layer. All the security protocols and technology used in Ceerus are widely accepted standards.
The main focus for Ceerus is around better security and better control of data. We don’t want to change the way people use their favourite apps in the workplace but we are developing Ceerus as a way for our users to continue communicating the way they like while enabling enterprises that own the risk to secure their data better and control it better to make compliance easier.
The Ceerus app is free of charge and provides unlimited voice, video and messaging capability to other Ceerus users. Premium features for enterprise, such as distributed key management or third party messaging services connecters can be purchased from SQR Systems.*Data charges may apply. Contact your mobile service provider for details.
Ceerus is available to anyone through the Google Play Store and Apple App Store.
All call and message data are encrypted end-to-end so you can be confident that nobody else is able to access your data but you. Even we don’t have access to the contents of your calls and messages because we don’t store it in our servers.
We do not store your contact directory anywhere. During initial setup, we check your contact directory to see who is already a Ceerus subscriber but this information is not stored.
Ceerus App provides end-to-end encryption, security and compliance and can be connected with third party services or enterprise level data control features using Ceerus Enterprise.
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements.Read more…
Multimedia Internet KEYing (MIKEY) is a key management protocol that is intended for use with real-time applications. It can specifically be used to set up encryption keys for multimedia sessions that are secured using SRTP, the security protocol commonly used for securing real-time communications such as VoIP.
Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY). This is an Identity-Based Authenticated Key Exchange method. Read more…
SS7 (Signaling System No. 7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down telephone calls in most parts of the world-wide public switched telephone network (PSTN). The protocol also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other services.
In 2008, several SS7 vulnerabilities were published that permitted the tracking of cell phone users. In 2014, the media reported a protocol vulnerability of SS7 by which anybody can track the movements of cell phone users from virtually anywhere in the world with a success rate of approximately 70%. In addition, eavesdropping is possible by using the protocol to forward calls and also facilitate decryption by requesting that each caller's carrier release a temporary encryption key to unlock the communication after it has been recorded. Read more…
Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. The practice is widely regarded as unethical, and in many jurisdictions is illegal.
Read more…
Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. Read more…